Preview

afasf

Powerful Essays
Open Document
Open Document
8021 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
afasf
Solutions to Chapter 5
1. Explain the difference between connectionless unacknowledged service and connectionless acknowledged service. How do the protocols that provide these services differ?
Solution:
In an acknowledged connectionless network, reliable delivery can be achieved through the use of
ACK and NAK transmissions. Such protocols are suited for communication over networks in which higher layers are sensitive to loss and the underlying network is inherently unreliable with a significant probability of loss or error.
Unacknowledged networks provide simpler and faster communication for networks that are inherently reliable or provide service to higher layers that can tolerate information loss.
2. Explain the difference between connection-oriented acknowledged service and connectionless acknowledged service. How do the protocols that provide these services differ?
Solution:
The use of acknowledgments can provide reliable transfer over networks that are prone to error and loss. In connection oriented networks, every packet in a data flow travels on the same path through the network and the proper ordering of packets is guaranteed. In such networks, if a packet arrives out of order, the receiver immediately knows that a packet has been lost. In a connectionless network, the service needs a mechanism for dealing with unordered delivery of information. This is especially important for real-time or delay-sensitive traffic, which may require immediate retransmission and may not be able to use buffering to correct unordered packet arrivals.
3. Suppose that the two end-systems α and β in Figure 5.3 communicate over a connection-oriented packet network. Suppose that station α sends a 10-kilobyte message to station β and that all packets are restricted to be
1000 bytes (neglect headers); assume that each packet can be accommodated in a data link frame. For each of the links, let p be the probability that a frame incurs errors during transmission.

You May Also Find These Documents Helpful

  • Powerful Essays

    - two or more connections are combined to create a logically singular higher bandwidth connection (pg8)…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment

    • 629 Words
    • 3 Pages

    In a bus configuration, each computer in the network is responsible for carrying out its own communications without the help of a central unit. A common communications cable (the bus) connects all of the computers in the network. As data travels along the cable, each unit performs a query to determine if it is the intended recipient of the message. The bus network is less expensive than the star configuration and is thus widely in use for systems that connect only a few microcomputers and systems that do not emphasize the sharing of common resources.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 4: The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IPv4 Address of the machine to which the source is trying to communicate) with its own Protocol Address (IPv4 Address). Those who do not match will drop the packet without any action.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    At this layer error recovery is also performed. The following are examples TCP, UDP, and SPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    sharing of information made thorough and routine. Although such a solution can be seen as…

    • 6251 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    4. Name a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?65, 69…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 9

    • 474 Words
    • 2 Pages

    8. Linear topology – One linear data line that connects to LAN. If one computer crashes all of them crash also.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Midterm Exam

    • 2086 Words
    • 9 Pages

    B. The channel of the message is faulty, or else the correct term would be sent and received.…

    • 2086 Words
    • 9 Pages
    Good Essays